Sciweavers

458 search results - page 67 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
AAAI
1996
14 years 6 days ago
Comet: An Application of Model-Based Reasoning to Accounting Systems
An important problem faced by auditors is gauging how much reliance can be placed on the accounting systems that process millions of transactions to produce the numbers summarized...
Robert Nado, Melanie Chams, Jeff Delisio, Walter H...
INFOCOM
2009
IEEE
14 years 5 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
JEI
2008
128views more  JEI 2008»
13 years 10 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
MICRO
2006
IEEE
74views Hardware» more  MICRO 2006»
14 years 4 months ago
Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware
Although processor design verification consumes ever-increasing resources, many design defects still slip into production silicon. In a few cases, such bugs have caused expensive...
Smruti R. Sarangi, Abhishek Tiwari, Josep Torrella...
CVPR
2007
IEEE
14 years 2 months ago
Improving Part based Object Detection by Unsupervised, Online Boosting
Detection of objects of a given class is important for many applications. However it is difficult to learn a general detector with high detection rate as well as low false alarm r...
Bo Wu, Ram Nevatia